We propose a novel data integrity protection scheme, which relies on multiple, intervoven authentication chains instead of data origin authentication. We show that the scheme allows for secure node-to-node communication at very low implementation cost, under a certain attacker model, without reliance on a base stationShow more